Page 535 of 2774 results (0.022 seconds)

CVSS: 5.4EPSS: 74%CPEs: 233EXPL: 1

The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic. La función sctp_sf_do_5_2_4_dupcook en net/sctp/sm_statefuns.c en la implementación SCTP en el kernel de Linux anterior a v3.8.5 no maneja correctamente asociaciones durante el proceso de duplicación de COOKIE ECHO chunk, lo que permite a atacantes remotos causar una denegación de servicios (puntero NULL y caída del sistema) o posiblemente tenga otro impacto sin especificar a través de tráfico SCTP. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2815633504b442ca0b0605c16bf3d88a3a0fcea http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00024.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://rhn.redhat.com&#x • CWE-476: NULL Pointer Dereference •

CVSS: 2.1EPSS: 0%CPEs: 259EXPL: 1

The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive. La función mmc_ioctl_cdrom_read_data en drivers/cdrom/cdrom.c en el kernel de Linux hasta v3.10 permite a usuarios locales obtener información sensible de la memoria del kernel a través de operaciones de lectura en una unidad de CD-ROM que no funcione correctamente • http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/drivers/cdrom/cdrom.c?id=050e4b8fb7cdd7096c987a9cd556029c622c7fe2 http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://rhn.redhat.com/errata/RHSA-2013-1166.html http://rhn.redhat.com/errata/RHSA-2013-1645.html http://www.debian.org/security/2013/dsa-2766 h • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.9EPSS: 0%CPEs: 9EXPL: 1

Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message. Vulnerabilidad de formato de cadena en la función b43_request_firmware de drivers/net/wireless/b43/main.c en el driver del Broadcom B43 inhalambrico para el kernel Linux hasta la versión v3.9.4 permite a usuarios locales conseguir privilegios haciendo uso de acceso root e incluyendo especificaciones de formato de cadena en un parámetro fwpostfix modprobe, provocando una construcción inapropiada de un mensaje de error • https://www.exploit-db.com/exploits/38559 http://git.kernel.org/cgit/linux/kernel/git/linville/wireless.git/commit/?id=9538cbaab6e8b8046039b4b2eb6c9d614dc782bd http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://rhn.redhat.com/errata/RHSA-2013-1051.html http://rhn.redhat.com/errata/RHSA-2013-1450.html http://www.debian.org/security/2013/dsa-2766 http://www.openwall.com/lists/oss-security/2013 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 2.1EPSS: 0%CPEs: 12EXPL: 0

The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor. La función fill_event_metadata en fs/notify/fanotify/fanotify_user.c en Linux kernel hasta v3.9.4 no inicializa determinadas estructuras, lo que permite a atacantes locales obtener información sensible desde la memoria del kernel a través de una operación de lectura en el descriptor fanotify. • http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://lkml.org/lkml/2013/6/3/128 http://www.openwall.com/lists/oss-security/2013/06/05/26 http://www.ubuntu.com/usn/USN-1929-1 http://www.ubuntu.com/usn/USN-1930-1 https://bugzilla.redhat.com/show_bug.cgi?id=971258 https://access.redhat.com/securit • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-399: Resource Management Errors •

CVSS: 4.7EPSS: 0%CPEs: 9EXPL: 1

arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit. arch/x86/kernel/cpu/perf_event_intel.c en Linux kernel hasta v3.8.9 cuando Performance Events Subsystem esta habilitado, especifica una máscara de bits correctos, lo que permite a usuarios locales provocar una denegación de servicio (error de protección general y el bloqueo del sistema) al tratar de establecer un bit reservado. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f1923820c447e986a9da0fc6bf60c1dccdf0408e http://rhn.redhat.com/errata/RHSA-2013-1173.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9 http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 http://www.openwall.com/lists/oss-security/2013/06/05/23 https://bugzilla.redhat.com/show_bug.cgi?id=971309 https://github.com/torvalds/linux/commit/f1923820c447e986a9da0fc6bf60c1dccdf0408e https:&#x • CWE-20: Improper Input Validation •